By default Authentication Services for Smart Cards is configured to automatically retrieve trusted certificates and CRLs from Active Directory. It is possible to do this securely because Authentication Services sets up a secure communication channel at join time using the symmetric host key that it uses to join itself to the domain.
Active Directory stores trusted certificates for smart card login in the NtAuthCertificates container which is located by the LDAP distinguished name.
CN=NtAuthCertificates,CN=Public Key Services,CN=Configuration, DC=<domain>,DC=<domain>,…
By default, any certificates placed in this location in Active Directory are automatically distributed to both Windows and Authentication Services for Smart Cards clients.
Authentication Services for Smart Cards places these trusted certificates in the NtAuth subdirectory of the /var/opt/quest/vas/certs directory.
Note: You should not place any additional certificates in this subdirectory as they may be deleted from time to time. You may however place additional trusted certificates directly in the /var/opt/quest/vas/certs directory.
By default Authentication Services for Smart Cards retrieves any CRLs that are required to verify the certificates presented by Active Directory and automatically updates these as they expire and new certificates are issued. To be able to retrieve CRLs, the certificates to which they correspond must contain a CRL distribution points extension that contains an LDAP URI from which to download the CRL.
CRLs are stored in the /var/opt/quest/vas/crls directory.
Authentication Services provides a number of vas.conf options for configuring bootstrapping behavior.
|auto-crl-download||Whether to automatically download CRLs as needed.|
|auto-crl-removal||Whether to remove out-of-date CRLs from the cache automatically.|
|bootstrap-trusted-certificate||Whether trusted certificates should be automatically retrieved from Active Directory.|
|trusted-certs-update-interval||How often trusted certs and CRL should be updated (default 8 hours).|
|auto-crl-download-bind-type||How to bind to the LDAP directory when retrieving CRLs.|